Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University...

25
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course August 31, 2012

Transcript of Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University...

Page 1: Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course August.

Data and Applications Security Developments and Directions

Dr. Bhavani Thuraisingham

The University of Texas at Dallas

Introduction to the Course

August 31, 2012

Page 2: Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course August.

Objective of the Unit

This unit provides an overview of the course. The course describes concepts, developments, challenges, and directions in data and applications security. Topics include

- database security, distributed data management security, object security, data warehouse security, data mining for security applications, privacy, secure semantic web, secure digital libraries, secure knowledge management and secure sensor information management, biometrics

Page 3: Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course August.

Outline of the Unit

Outline of Course Course Work Course Rules Contact Appendix

Page 4: Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course August.

Outline of the Course

Unit #1: Introduction to Data and Applications

Part I: Background

- Unit #2: Data Management

- Unit #3: Information Security

- Unit #4: Information Management Part II: Discretionary Security

- Unit #5: Concepts

- Unit #6: Policy Enforcement Part III: Mandatory Security

- Unit #7: Concepts

- Unit #8: Architectures

Page 5: Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course August.

Outline of the Course (Continued)

Part IV: Secure Relational Data Management

- Unit #9: Data Model

- Unit #10: Functions

- Unit #11: Prototypes and Products Part V: Inference Problem

- Unit #12: Concepts

- Unit #13: Constraint Processing

- Unit #14: Conceptual Structures Part VI: Secure Distributed Data Management

- Unit #15: Secure Distributed data management

- Unit #16: Secure Heterogeneous Data Integration

- Unit #17: Secure Federated Data Management

Page 6: Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course August.

Outline of the Course (Continued)

Part VII: Secure Object Data Management

- Unit #18: Secure Object Management

- Unit #19: Secure Distributed Objects and Modeling Applications

- Unit #20: Secure Multimedia Systems

Part VIII: Data Warehousing, Data Mining and Security

- Unit #21: Secure Data Warehousing

- Unit #22: Data Mining for Security Applications

- Unit #23: Privacy

Part IX: Secure Information Management

- Unit #24: Secure Digital Libraries

- Unit #25: Secure Semantic Web (web services, XML security)

- Unit #26: Secure Information and Knowledge Management

Page 7: Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course August.

Outline of the Course (Continued)

Part X: Emerging Technologies

- Unit #27: Secure Dependable Data Management

- Unit #28: Secure Sensor and Wireless Data Management

- Unit #29: Other Emerging Technologies Unit #30 Conclusion to the Course Guest Lectures Some guest lectures may be included

Insider Threat Additional Topics including Secure Web Services Social network security and privacy Secure cloud computing Review for finals

Page 8: Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course August.

Tentative Schedule

August 31: Introduction September 7: Policies and Access Control September 14: Multilevel Data Management September 21: Inference Problem September 28: Secure Distributed and Object Data Management October 5: Data Warehousing, Data Mining, Security and Privacy October 12: Secure Web Services and Review for Exam October 19: Exam #1 October 26: Secure semantic web and XML security November 2: Secure Cloud Computing November 9: Secure Knowledge Management and Social Networking November 16: Secure Dependable Data Management, Digital Forensics November 23: Holiday November 30: Mobile phone security and special topics December 7: Selected project presentations and review December 14: Exam #2

Page 9: Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course August.

Tentative Schedule

Assignment #1 due date: September 21, 2012 Assignment #2: due date: September 28, 2012 Term #1: October 12, 2012 Exam #1: October 19, 2012 Assignment #3: October 26, 2012 Assignment #4: November 2, 2012 (due date: November 16, 2012) Term paper #2: November 9, 2012 Project: November 30, 2012 Exam #2: December 14, 2012

Page 10: Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course August.

Course Work

Two term papers; each worth 8 points Two exams each worth 24 points Programming project worth 12 points Four homework assignments each worth 6 points Total 100 points Course Book: Database and Applications Security:

Integration Data Management and Information Security, Bhavani Thuraisingham, CRC Press, 2005

Will also include papers as reading material

Page 11: Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course August.

Some Topics for Papers

XML Security Inference Problem Privacy Secure Biometrics Intrusion Detection E-Commerce Security Secure Sensor Information Management Secure Distributed Systems Secure Semantic Web Secure Data Warehousing Insider Threat Analysis Secure Multimedia Systems

Page 12: Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course August.

Term Papers: Example Format

Abstract Introduction Background on the Topic Survey of various techniques, designs etc, Analyze the techniques, designs etc. and give your opinions Directions for further work Summary and Conclusions References

Page 13: Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course August.

Term Papers: Example Format - II

Abstract Introduction Background on the Topic and Related Work Discuss strengths and weaknesses of your work and others’

work Give your own design Directions for further work Summary and Conclusions References

Page 14: Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course August.

Project Report Format

Overview of the Project Design of the System Input/Output Future Enhancements References

Page 15: Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course August.

Some Project Topics

Quivery Modification on XML Documents Access control for web systems Intrusion detection system Access control for multimedia systems

- E.g., access control for image, video Role-based access control system Access control for object systems Secure data warehouse

Page 16: Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course August.

Course Rules

Course attendance is mandatory; unless permission is obtained from instructor for missing a class with a valid reason (documentation needed for medical emergency for student or a close family member – e.g., spouse, parent, child). Attendance will be collected every lecture. 3 points will be deducted out of 100 for each lecture missed without approval.

Each student will work individually Late assignments will not be accepted. All assignments have to be

turned in just after the lecture on the due date No make up exams unless student can produce a medical certificate or

give evidence of close family emergency Copying material from other sources will not be permitted unless the

source is properly referenced Any student who plagiarizes from other sources will be reported to the

appropriate UTD authroities

Page 17: Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course August.

Assignment #1, 2, 3, 4

Assignment #1: Posted in Lecture #7

Assignment #2 Posted in Lecture #11

Assignment #3: Posted in Lecture #17

Assignment #4: Posted in Lecture # 22

Page 18: Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course August.

Contact

For more information please contact

- Dr. Bhavani Thuraisingham

- Professor of Computer Science and

- Director of Cyber Security Research Center Erik Jonsson School of Engineering and Computer Science EC31, The University of Texas at Dallas Richardson, TX 75080

- Phone: 972-883-4738

- Fax: 972-883-2399

- Email: [email protected]

- URL:http://www.utdallas.edu/~bxt043000/

Page 19: Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course August.

Papers to Read for Exam #1

- RBAC: Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, Charles E. Youman: Role-Based Access Control Models. IEEE Computer 29(2): 38-47 (1996)

- UCON: Jaehong Park, Ravi S. Sandhu: The UCONABC usage control model. ACM Trans. Inf. Syst. Secur. 7(1): 128-174 (2004) - Read the first 20 pages (sections 1, 2, 3)

- DCON: Roshan K. Thomas, Ravi S. Sandhu: Towards a Multi-dimensional Characterization of Dissemination Control. POLICY 2004: 197-200 (IEEE)

- Pallabi Parveen, Jonathan Evans, Bhavani M. Thuraisingham, Kevin W. Hamlen, Latifur Khan: Insider Threat Detection Using Stream Mining and Graph Mining. SocialCom/PASSAT 2011: 1102-1110

Page 20: Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course August.

Papers to Read for Exam #1

- Bhavani M. Thuraisingham: Mandatory Security in Object-Oriented Database Systems. OOPSLA 1989: 203-210

- Bhavani M. Thuraisingham, William Ford: Security Constraints in a Multilevel Secure Distributed Database Management System. IEEE Trans. Knowl. Data Eng. 7(2): 274-293 (1995)

- Rakesh Agrawal, Ramakrishnan Srikant: Privacy-Preserving Data Mining. SIGMOD Conference 2000: 439-450

- Optional paper Mohammad M. Masud, Jing Gao, Latifur Khan, Jiawei Han,

Bhavani M. Thuraisingham: Classification and Novel Class Detection in Concept-Drifting Data Streams under Time Constraints. IEEE Trans. Knowl. Data Eng. 23(6): 859-874 (2011)

Page 21: Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course August.

Index to Lectures for Exam #1

Lecture 1: Data and Applications Security 8/31/2012 Lecture 2: Cyber Security Modules 8/31/2012 (extra credit) Lecture 3: Background on data management (no date) Lecture 4: Access Control (9/7/2012) Lecture 5: Policies (9/7/2012) Lecture 6: Multilevel Secure Data Management (Taped, 9/14/2012) Lecture 7: Assignment #1 Lecture 8: Ms Parveen Lecture Insider threat (9/14/2012) Lecture 9: Inference Problem 1 (9/21/2012) Lecture 10: Inference Problem 2 (9/21/2012) Lecture 11: Assignment #2 Lecture 12: Secure Distributed Data Management (9/28/2012)

Page 22: Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course August.

Index to Lectures for Exam #1

Lecture 13: Secure Object System (9/28/2012) Lecture 14: Secure Data Warehousing (10/5/2012) Lecture 15: Data Mining for Malware Detection (10/12/2012) Lecture 16: Privacy (10/5/2012) Lecture 17: Assignment #3 Questions: Discretionary security, Policies, Multilevel Data Management,

Security Constraint processing for inference control,, Semantic net for inference control, Secure distributed data management and information sharing, Secure object and geospatial data, Secure data warehousing with examples, Privacy including privacy preserving data mining, Data mining for malware detection including insider threat

Extra credit – Lecture #2

Page 23: Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course August.

Papers to Read for Exam #2

Abhijith Shastry, Murat Kantarcioglu, Yan Zhou, Bhavani M. Thuraisingham: Randomizing Smartphone Malware Profiles against Statistical Mining Techniques. DBSec 2012: 239-254

Barbara Carminati, Elena Ferrari, Raymond Heatherly, Murat Kantarcioglu, Bhavani M. Thuraisingham: A semantic web based framework for social network access control. SACMAT 2009: 177-186

Elisa Bertino, Barbara Carminati, Elena Ferrari, Bhavani M. Thuraisingham, Amar Gupta: Selective and Authentic Third-Party Distribution of XML Documents. IEEE Trans. Knowl. Data Eng. 16(10): 1263-1278 (2004)

Page 24: Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course August.

Index to Lectures for Exam #2

What is in red will not be included in exam #2 Lecture 18: Secure Web Services (10/12/2012) - 1 Lecture 19: Trustworthy semantic web (10/26/2012?) - 1 Lecture 20: XML security (10/26/2012?) - 1 Lecture 21: Introduction to semantic web (10/26/2012?) Lecture 22: Assignment #4 Lecture 23: Secure cloud computing introduction (11/2/2012)

– 0.5 Lecture 24: Secure cloud computing prototypes at UTD (11/2)

– 0.5 * Lecture 25: Secure Knowledge Management and Web

Security (11/9/2012) - 1 Lecture 26: Secure Social Networks (11/9/2012) - 1

Page 25: Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course August.

Index to Lectures for Exam #2

Lecture 27: Dependable Data Management (11/16/2012) – 1Lecture 28: Digital Forensics and Biometrics (11/16/2012) - 1Lecture 29: Guest Lecture: Satyen Abrol (11/16/2012)Lecture 30: Virtualization Security (11/30/2012) - 1Lecture 31: Smartphone malware and security (11/30/2012) - 1Lecture 32: Guest Lecture – Dr. Latifur Khan (12/7/2012)Extra credit: any question from the lectures